基于LEACH的轻量级Sybil攻击检测算法
摘要
针对无线传感网络中低功耗分簇型路由协议LEACH易遭受Sybil攻击的问题,提出一种基于接收信号强度值的轻量级检测算法。在充分分析无线传感网络自身特点与LEACH协议原理的基础上,采用信号强度值比较以低成本、快速检测Sybil攻击。仿真实验证明,算法可以以较低代价有效检测Sybil恶意攻击,保证网络正常运行。
出处
《电脑知识与技术》
2017年第12X期53-54,共2页
Computer Knowledge and Technology
二级参考文献27
-
1Medaglia C M, Serbanati A. An overview of privacy and security issues in the Internet of things [C]// Proceedings of the 20th Tyrrhenian Workshop on Digital Communications. Sardinia, Italy: Springer, 2010:389-395.
-
2Leusse P, Periorellis P, Dimitrakos T. Self managed security cell, a security model for the Internet of Things and services [C]// Proceedings of the 1st International Conference on Advances in Future Internet. Athens/Glyfada, Greece: IEEE, 2009: 47-52.
-
3Hamad F, Smalov L, James A. Energy-aware security in M commerce and the Internet of Things[J].IETE Technical review, 2009, 26(5) : 357 - 362.
-
4Juels A. RFID security and privacy: A research survey [J]. IEEE Journal on Selected Areas in Communication, 2006, 24(2) :381 - 394.
-
5Weber R H. Internet of Things New security and privacy challenges [J]. Computer Law & Security Reviezo, 2010, 26(1): 23-30.
-
6CHEN Xiangqian, Makki K, Yen K, et al. Sensor network security: A survey [J]. IEEE communications Surveys Tutorials, 2009, 11(2) : 52 - 73.
-
7Asrar I. Could sexy space be the birth of the sms botnet? [Z/OL]. (2010-10-16), http: //www. symantec, corn/connect/ blogs/could-sexy-space-be-birth-sms-botnet.
-
8Karygiannis T, Eydt B, Barber B, et al. Guidance for securing radio frequency identification (RFID) systems [Z/OL]. (2010-10-16), http: //www. google, com. hk/url? sa = t&source- web&cd = 1&ved -- 0CCIQFjAA&url = http%3A%2F%2Fwww, rfidsecurityalliance, org%2Fdocs %2FDraft SP800-98%2520-%2520Guidance%2520for%2520 Securing%2520RFID. pdf&ret = j%q -- XSBlaN5D X 09Guidance% 20for% 20Securing%20Radio% 20Frequency %20Identification%20(RFID) %20Systems. &ei = vxhwTqbYLa 64iAfk2LCtCQ&usg = AFQjCNGoB6IJZ12KcFBUkWh_ 5PWGkOQSpg&cad- rjt.
-
9Eschenauer L, Gligor V. A key management scheme for distributed sensor networks [C]// Proceedings of the 9th ACM Conference on Computer and Communications Security. New York, USA: Association for Computing Machinery, 2002, 41 - 47.
-
10ZHANG Wensheng, Tran M. A random perturbation-based scheme for pairwise key establishment in sensor networks [C]// Proceedings of the 8th ACM International Symposium on Mobile ad Hoc Networking and Computing. New York, USA: Association for Computing Machinery, 2007: 90 - 99.
共引文献97
-
1孙维.基于物联网的感知矿山体系结构与关键技术研究[J].煤炭技术,2015,34(6):250-252. 被引量:5
-
2周航,秦东霞.物联网的安全威胁与应对策略[J].智能计算机与应用,2012,2(3):37-39. 被引量:1
-
3任宏.浅谈物理网安全问题及措施[J].计算机光盘软件与应用,2012,15(13):54-55.
-
4孙建华,陈昌祥.物联网安全初探[J].通信技术,2012,45(7):100-102. 被引量:18
-
5马纪丰,梁浩.物联网感知层信息安全分析与建议[J].现代电子技术,2012,35(19):76-78. 被引量:9
-
6周中伟,何小东,周中意.物联网在森林管理中的安全问题及防护措施[J].中南林业科技大学学报,2012,32(9):78-80. 被引量:5
-
7李钊,彭勇,谢丰,高洋,陈冬青,徐国爱.信息物理系统安全威胁与措施[J].清华大学学报(自然科学版),2012,52(10):1482-1487. 被引量:22
-
8黄益彬,吕洋,杨维永.智能终端网络安全防护设计[J].计算机与现代化,2012(12):106-109. 被引量:2
-
9王自力,郑鑫.物联网系统安全威胁与应对措施初探[J].现代计算机(中旬刊),2012(12):7-10. 被引量:1
-
10李子臣.移动互联网时代信息安全新技术展望[J].信息通信技术,2012,6(6):75-80. 被引量:9
-
1刘毅,李瑞祥,施伟斌,吉彩云.基于ZigBee的室内定位系统设计[J].数据通信,2017(5):16-18. 被引量:1
-
2刘雪梅.防火墙技术在计算机网络安全中的应用[J].当代旅游,2017,0(5):95-95.
-
3李云,李道全,常来花.基于LEACH的轻量级HELLO flood攻击检测算法[J].电脑知识与技术,2017,13(9X):34-36.
-
4陈锐.浅析目前软件工程技术在网络时代背景下的发展[J].西部皮革,2017,39(8):21-21. 被引量:6
-
5朱杰.计算机软件中安全漏洞检测技术及其应用的探讨[J].电脑迷,2017(8):187-187. 被引量:4
-
6增强航天私企的信心与积极性 航天在特朗普国安战略中地位突出[J].卫星与网络,2017,0(12):76-76.
-
7罗子懿.计算机木马的工作原理[J].通讯世界,2017,23(24):104-105.
-
8吴小华,张爱国.计算机网络安全技术及其防范策略研究[J].数字技术与应用,2017,35(11):200-200. 被引量:14
-
9邵坤,诸邵忆,冯越,张艳芳,吕彬.RFID证卡安全性浅析[J].保密科学技术,2017,0(11):36-40.
-
10刘海飞,柏巍,李冬昕,许金涛.沪港通交易制度能提升中国股票市场稳定性吗?——基于复杂网络的视角[J].管理科学学报,2018,21(1):97-110. 被引量:78